A survey of MulVAL extensions and their attack scenarios coverage

D Tayouri, N Baum, A Shabtai, R Puzis - IEEE Access, 2023 - ieeexplore.ieee.org
Organizations employ various adversary models to assess the risk and potential impact of
attacks on their networks. A popular method of visually representing cyber risks is the attack …

Review into state of the art of vulnerability assessment using artificial intelligence

S Khan, S Parkinson - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
Vulnerability assessment is the essential and well-established process of probing security
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …

Securi cad by foreseeti: A cad tool for enterprise cyber security management

M Ekstedt, P Johnson, R Lagerström… - 2015 IEEE 19th …, 2015 - ieeexplore.ieee.org
This paper presents a CAD tool for enterprise cyber security management called securi
CAD. It is a software developed during ten years of research at KTH Royal Institute of …

A hybrid threat model for smart systems

F Valenza, E Karafili, RV Steiner… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cyber-physical systems and their smart components have a pervasive presence in all our
daily activities. Unfortunately, identifying the potential threats and issues in these systems …

Evaluation of visual notations as a basis for ics security design decisions

S Fluchs, R Drath, A Fay - IEEE Access, 2023 - ieeexplore.ieee.org
For making informed security decisions during the design of industrial control systems (ICS),
engineers need to process large amounts of security-relevant information outside their area …

[PDF][PDF] Quantitative security risk assessment for industrial control systems: Research opportunities and challenges

M Eckhart, B Brenner, A Ekelhart, E Weippl - 2019 - eprints.cs.univie.ac.at
Due to the gradual implementation of the Industry 4.0 vision, information technology is
becoming increasingly important in industrial control systems (ICSs), such as production …

The impact of cyber security on business: how to protect your business

EM Kala - Open Journal of Safety Science and Technology, 2023 - scirp.org
This book presents knowledge and grasp of numerous sorts of computer attacks, as well as
the reasons and targets of those attacks. The introduction of the article includes a brief …

Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

S Chockalingam, W Pieters, A Teixeira, P van Gelder - Cybersecurity, 2021 - Springer
Water management infrastructures such as floodgates are critical and increasingly operated
by Industrial Control Systems (ICS). These systems are becoming more connected to the …

Cyberattack graph modeling for visual analytics

M Rabzelj, C Bohak, LŠ Južnič, A Kos, U Sedlar - IEEE Access, 2023 - ieeexplore.ieee.org
Cybersecurity research demands continuous monitoring of the dynamic threat landscape to
detect novel attacks. Researchers and security professionals often deploy honeypot …

A model based approach for SCADA safety and security joint modelling: S-Cube

S Kriaa, M Bouissou, Y Laarouchi - 2015 - IET
Modern control systems are becoming complex and interconnected as they are increasingly
integrating new information and communication technologies. Many industries like …